On Monday, June 19, 2017 at 1:27:46 AM UTC+3, Nick Lamb wrote:
> On Sunday, 18 June 2017 16:37:13 UTC+1, Eric Mill  wrote:
> > One question though, is whether the key was compromised at the time of
> > intentionally shipping​ it in a distributed executable. That choice
> > knowingly exposed the key to arbitrary public users, even if they didn't
> > expect this to happen from doing so.
> 
> Yes, the subscriber intentionally compromised this key when they implemented 
> this decision. This was a foreseeable consequence. If they didn't foresee it, 
> that's not because it wasn't foreseeable but because they're foolish. A 
> reasonable person who understood what was going on here (public key 
> cryptography, the purpose of certificates in the Web PKI) should have 
> understood they were intentionally compromising their key.

You assume too much about a "reasonable person".
Yes, most developers understand PKI / key management to a point, but many 
(many) just don't, or do and simply make the mistake of not thinking it 
through, like many other software defects. Bottom line - could happen 
unintentionally.
_______________________________________________
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to